Seguir
Lili Xu
Lili Xu
Institute of Information Engineering, Chinese Academy of Sciences and Ecole Polytechnique
Dirección de correo verificada de lix.polytechnique.fr
Título
Citado por
Citado por
Año
Generalized bisimulation metrics
K Chatzikokolakis, D Gebler, C Palamidessi, L Xu
International Conference on Concurrency Theory, 32-46, 2014
682014
A Survey on Adversarial Attacks in Computer Vision: Taxonomy, Visualization and Future Directions
T Long, Q Gao, L Xu, Z Zhou
Computers & Security, 102847, 2022
562022
1dVul: Discovering 1-Day Vulnerabilities through Binary Patches
J Peng, F Li, B Liu, L Xu, B Liu, K Chen, W Huo
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
372019
Metrics for differential privacy in concurrent systems
L Xu, K Chatzikokolakis, H Lin
International Conference on Formal Techniques for Distributed Objects …, 2014
242014
B2SMatcher: fine-Grained version identification of open-Source software in binary files
G Ban, L Xu, Y Xiao, X Li, Z Yuan, W Huo
Cybersecurity 4 (1), 1-21, 2021
112021
Modular reasoning about differential privacy in a probabilistic process calculus
L Xu
International Symposium on Trustworthy Global Computing, 198-212, 2012
92012
A Light-Weight and Accurate Method of Static Integer-Overflow-to-Buffer-Overflow Vulnerability Detection
M Xu, S Li, L Xu, F Li, W Huo, J Ma, X Li, Q Huang
International Conference on Information Security and Cryptology, 404-423, 2018
82018
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs
H Su, L Xu, H Chao, F Li, Z Yuan, J Zhou, W Huo
2022 IEEE 33rd International Symposium on Software Reliability Engineering …, 2022
62022
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
L Xu, M Xu, F Li, W Huo
Cybersecurity 3 (1), 1-19, 2020
62020
VERJava: Vulnerable Version Identification for Java OSS with a Two-Stage Analysis
Q Sun, L Xu, Y Xiao, F Li, H Su, Y Liu, H Huang, W Huo
2022 IEEE International Conference on Software Maintenance and Evolution …, 2022
42022
Formal verification of differential privacy in concurrent systems
L Xu
Ecole Polytechnique (Palaiseau, France), 2015
42015
Splendor: Static Detection of Stored XSS in Modern Web Applications
H Su, F Li, L Xu, W Hu, Y Sun, Q Sun, H Chao, W Huo
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm
K Zhan, L Xu, Z Yuan, W Zhang
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
32018
Complete proof systems for amortised probabilistic bisimulations
LL Xu, HM Lin
Journal of Computer Science and Technology 31 (2), 300-316, 2016
12016
分摊概率互模拟的完备证明系统
LL Xu, HM Lin
计算机科学技术学报 31 (2), 300-316, 2016
2016
A Multiplicative Variant of the Kantorovich distance for Differential Privacy
L Xu, K Chatzikokolakis, C Palamidessi
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–16